CN109245940B - Method for discovering and detecting network equipment - Google Patents

Method for discovering and detecting network equipment Download PDF

Info

Publication number
CN109245940B
CN109245940B CN201811196136.9A CN201811196136A CN109245940B CN 109245940 B CN109245940 B CN 109245940B CN 201811196136 A CN201811196136 A CN 201811196136A CN 109245940 B CN109245940 B CN 109245940B
Authority
CN
China
Prior art keywords
neighbor
master
backup
message
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811196136.9A
Other languages
Chinese (zh)
Other versions
CN109245940A (en
Inventor
黄海良
郭超
张双明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Zhuowang Information Technology Co ltd
Original Assignee
Xiamen Zhuowang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Zhuowang Information Technology Co ltd filed Critical Xiamen Zhuowang Information Technology Co ltd
Priority to CN201811196136.9A priority Critical patent/CN109245940B/en
Publication of CN109245940A publication Critical patent/CN109245940A/en
Application granted granted Critical
Publication of CN109245940B publication Critical patent/CN109245940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/30Decision processes by autonomous network management units using voting and bidding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements

Abstract

The invention discloses a method for discovering and detecting network equipment, which comprises a server and a plurality of network equipment to be monitored in an area to be positioned, and also comprises the following steps: a: and (3) master and backup election: the number of network devices passing through the network device to other network devices and the priority of the network device are used for contesting for selecting the master and the backup; b: equipment detection: the master detects whether the network equipment can reach or not by sending a detection message and sends a detection result to the server; c: addition of new equipment: the new device receives the detection message and sends self information to the master, and the server synchronizes the information of the new device through the master; d: re-election of master: the network equipment judges whether the master and the backup work normally or not through the detection message, and if the master and the backup fail, the master and the backup are selected again; the invention solves the problems of long detection period, large calculation resource consumption and the like in the prior art, improves the detection efficiency of mass network equipment and reduces the resource consumption compared with the prior art.

Description

Method for discovering and detecting network equipment
Technical Field
The invention relates to a method for discovering and detecting network equipment.
Background
With the development of economy, more and more network devices enter the daily life of people; the number of network equipment such as a college campus with the scale of 2 ten thousand students, wireless AC, AP, an exchanger and the like can reach thousands or even tens of thousands; when some equipment is broken down and damaged and is off-line, serious influence is caused on network communication; the detection of network equipment and the rapid positioning of off-line equipment are important work for guaranteeing data communication.
At present, two main technical schemes for detecting network equipment are available; one is to adopt internet control message protocol, ICMP; it is a sub-protocol of the TCP/IP protocol suite for passing control messages between IP hosts and routers; its main role in the network is: host detection, route maintenance, route selection and flow control; PING is a major application of ICMP for detecting connectivity of network devices, where a source host sends an ICMP request message to a destination host; the target host responds an ICMP response message to the source host after receiving the response message, and if the source host receives the response message within a certain time, the target host is considered to be reachable; otherwise, it is not reachable.
The other is based on a C/S architecture by adopting a Simple Network Management Protocol (SNMP); SNMP consists of three parts, namely a Network Management Station (NMS), an Agent (Agent) and a Management Information Base (MIB); the Agent and MIB are located on the managed computer and network equipment, such as host, router, switch, terminal server and workstation, it is a software responsible for collecting the network information of the resident equipment waiting for NMS polling; when NMS wants to obtain monitoring data, it sends get operation to Agent through SNMP protocol, and the Agent gets data through MIB base and sends it to NMS, if it is Agent actively sending information to NMS, it adopts trap operation, as shown in figure 1.
The two existing technical schemes for detecting the network equipment have the problems of long detection period, large calculation resource consumption and the like.
Disclosure of Invention
The present invention is directed to overcome the deficiencies of the prior art and to provide a method for discovering and detecting network devices.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the technical scheme adopted by the invention for solving the technical problems is as follows: a method for discovering and detecting network equipment comprises a server and a plurality of network equipment to be monitored in an area to be positioned, and further comprises the following steps:
a: and (3) master and backup election: dividing the area to be monitored into several sub-areas ensures that each network device belongs to only one sub-area, the server is connected with each network device through the network, each network device sends election messages to the working physical port and updates the neighbor list of each network device, the election message comprises a distance and a priority, the distance represents the number of network devices from the network device to other network devices, the priority is obtained by each network device through calculation according to the CPU core number, the CPU frequency, the memory number, the memory size and the back plate bandwidth parameter, the minimum distance is selected as a master, the next minimum distance is a backup, the maximum priority is selected as the master when the distances are the same, the next maximum distance is selected as a backup, the minimum mac address is selected as the master when the priorities are the same, the next minimum distance is a backup, race selection is finished when no new device is added after a period of time, and the master informs the server of the data of the own neighbor list;
b: equipment detection: the master sends detection messages to all neighbors periodically according to the neighbor list, the neighbors enter into election inhibition after receiving the detection messages, the neighbor list of the master is not sent any more, meanwhile, a detection response message is sent to the master, the master sends a neighbor message list whether the neighbors can reach or not to a server according to whether the detection response message is received or not within a period of time, the server updates the neighbor list in the server according to the neighbor message list sent by the master, the server can inquire whether specific network equipment can reach or not by controlling the master to send the detection messages to the specific network equipment, the server sends the detection messages to the inaccessible network equipment by the master or through the master and updates the neighbor list in the server according to the returning condition;
c: addition of new equipment: after a new device is added, the new device receives a neighbor detection message of a master, sends a neighbor list of the new device to the master, and after the master receives the neighbor list, updates the neighbor list of the new device and sends information of newly added network devices to a server;
d: re-election: when the backup does not receive the detection message of the master within a period of time, the master is considered to be invalid, the backup becomes the master, when the backup receives the detection message of the master again, the master is considered to be recovered to normal, the backup is recovered to backup, when the network equipment does not receive the detection message within a period of time, the master and the backup are considered to be invalid, the competition inhibition is cancelled, and the master and the backup are again entered into competition.
In another preferred embodiment, in step a, the election message further includes a type field, an alive period and neighbor information, the type field indicates that the selectable types of the message include an election message and a maintenance message, the alive period indicates that the message stops being transmitted after passing through a plurality of neighbors, the neighbor information includes an affiliated area, a neighbor identifier, a neighbor IP and a neighbor priority, the affiliated area indicates a sub-area where the neighbor is located, the neighbor identifier indicates the uniqueness of the neighbor by using the mac address of the neighbor as the identifier, the neighbor IP indicates the IP address of the neighbor, and the neighbor priority indicates the priority size of the neighbor.
In another preferred embodiment, in step a, the neighbor list includes an area of interest, a neighbor identifier, a neighbor priority, whether the area of interest is a master, a neighbor IP, a survival time, and a distance to the neighbor, the area of interest represents a sub-area in which the neighbor is located, the neighbor identifier represents that the mac address of the neighbor is used as the identifier to represent the uniqueness of the neighbor, the neighbor priority represents the priority size of the neighbor, whether the mac address of the neighbor is a master or not, the neighbor IP represents the IP address of the neighbor, the survival time represents the time interval in which the neighbor sends the neighbor message, and the distance to the neighbor represents the number of network devices passed by the network device to the neighbor.
In another preferred embodiment, in step A, the priority is
Figure GDA0002931706460000041
Wherein α + β + γ ═ 1, α, β, γ ∈ (0, 1), a ≡ 255, and n is the core number of the network device CPU, and the CPU is a core number of the network device CPUiThe unit of the frequency of the ith CPU is MHz, m is the number of memory banks of the network equipment, memorryj is the size of the jth memory, the unit is GByte, bandwidth is the bandwidth of the network equipment complete machine backboard, the unit is Gbps, alpha, beta and gamma are weight ratios of the CPU, the memory and the backboard bandwidth respectively, and i, j, m, N belongs to N.
In another preferred embodiment, in step a, the priority may also be set manually.
In another preferred embodiment, in step B, the master preferentially sends a probe message to the backup.
In another preferred embodiment, in step B, if the master receives the probe response message of the neighbor within several sending cycles, indicating that the neighbor is reachable, the master sets the survival time in the neighbor list to 0, otherwise, the master sets the survival time in the neighbor list to timeout.
In another preferred embodiment, in step B, the neighbor message list includes the data of the belonging area, neighbor identification, neighbor IP, survival time and whether master in the neighbor list.
In another preferred embodiment, in step B, the neighbor list in the server includes data in the neighbor list advertised by the master and an online status indicating whether the neighbor is online, the online status is updated according to the time-to-live, if the time-to-live is 0, the online status is updated to be online, and if the time-to-live is timeout, the online status is updated to be failure.
In another preferred embodiment, in step C, when the master and backup in the sub-area where the new device is located are working normally, the new device does not become the master.
The invention has the beneficial effects that:
1. whether the network equipment in each subregion can be reached or not is detected by sending a detection message through the master of each subregion selected by competition, and a detection result is sent to the server, so that the server can quickly acquire the information whether the network equipment in each subregion can be reached or not, the detection efficiency of the mass network equipment is improved, and the resource consumption is reduced.
2. Each network device in the sub-area exchanges information through the election messages so as to update the neighbor list while master is carried out, the elected master sends data in the neighbor list to the server, and preliminary rapid detection of the network devices in the sub-area is carried out through the election messages, so that the detection efficiency is improved.
3. The states of all neighbors of all network equipment are stored through the neighbor list, whether all the neighbors can reach or not is conveniently recorded, and inaccessible neighbors can be preliminarily screened out through the neighbor list.
4. And the priority algorithm for freely giving weights to the CPU, the memory and the backboard bandwidth is adopted, so that the weights can be flexibly configured according to actual requirements.
5. The priority may also be manually set to meet specific requirements.
6. The master preferentially sends a detection message to the backup, preferentially detects whether the backup can be reached or not, can detect the backup in the first time when the backup has a problem, strives for time for subsequent maintenance of the backup, and can reselect the backup to ensure the overall stability.
7. The master sets the survival time in the neighbor list to be 0 or overtime according to whether the detection response message of the neighbor is received or not in a plurality of sending periods, and the server can know the state of the network equipment through the survival time of the network equipment.
8. The neighbor message list comprises the data of the region, the neighbor identification, the neighbor IP, the survival time and whether the master is included in the neighbor list, and the neighbor message list which is simpler than the neighbor list is used for reducing the resource consumption of the server synchronization neighbor state and improving the transmission efficiency.
9. And the neighbor list in the server sets the online state of the network equipment according to the survival time of the network equipment, and quickly and intuitively screens the failed network equipment.
10. When the master and the backup in the sub-area where the new equipment is located work normally, the new equipment cannot become the master so as to maintain the stability of the whole network.
The invention is further explained in detail with the accompanying drawings and the embodiments; but a network of the invention
The method of device discovery and detection is not limited to the embodiments.
Drawings
Fig. 1 is a schematic diagram of the operation of SNMP;
FIG. 2 is a network topology diagram of a preferred embodiment of the present invention;
FIG. 3 is a flow chart of a preferred embodiment of the present invention;
fig. 4 is a network topology diagram after a new device joins in accordance with a preferred embodiment of the present invention.
Detailed Description
In an embodiment, referring to fig. 2 to 4, a method for discovering and detecting a network device according to the present invention includes a server and a plurality of network devices to be monitored in an area to be located, and further includes the following steps:
a: and (3) master and backup election: the monitoring area is divided into area1 and area 2; the mac address and the IP address of the network device nodes of area1 and area2, the IP address of the server is shown in fig. 1; the server is interconnected with the two areas through a network; the parameters of the network device and the calculated priority are shown in table 1:
table 1 network device parameter table
Figure GDA0002931706460000061
Figure GDA0002931706460000071
Taking the election of area2 network device as an example, the election process is described below, and from the beginning, the neighbor list of each network device is only self, see tables 2 to 5
Table 2 neighbor list for node 21
Figure GDA0002931706460000072
TABLE 3 neighbor List for node 22
Figure GDA0002931706460000073
TABLE 4 neighbor List for node 23
Figure GDA0002931706460000074
TABLE 5 neighbor List for node 24
Figure GDA0002931706460000075
Each network device exchanges information of the neighbor list, and the first round of exchange refers to tables 6 to 9:
table 6 neighbor list of first round nodes 21
Figure GDA0002931706460000081
TABLE 7 neighbor List for first round nodes 22
Figure GDA0002931706460000082
Table 8 neighbor list of first round nodes 23
Figure GDA0002931706460000083
Table 9 neighbor list of first round nodes 24
Figure GDA0002931706460000084
See tables 10-13 for the second round of exchanges:
table 10 neighbor list of second round nodes 21
Figure GDA0002931706460000091
TABLE 11 neighbor List for second round nodes 22
Figure GDA0002931706460000092
TABLE 12 neighbor List for second round nodes 23
Figure GDA0002931706460000093
Table 13 neighbor list for second round nodes 24
Figure GDA0002931706460000094
Figure GDA0002931706460000101
Calculate the distance, see table 14:
distance of each node of table 14
Node 21 Node 22 Node 23 Node 24 Distance between two adjacent plates
Node 21 0 1 1 1 3
Node 22 1 0 2 2 5
Node 23 1 2 0 2 5
Node 24 1 2 2 0 5
The minimum distance is a node 21, the node 21 is selected as a master, the distance between the node 22 and the node 23 which are the next smallest is equal to the distance between the node 24 and the node 22 which are the next smallest, the node with the next largest priority is selected as backup, the priority of the node 22 is the largest, the node 22 is selected as backup, in 2 election cycles, when a neighbor list has no new neighbors to join, namely the neighbors are not updated, the network enters a stable state, and the master and backup election is finished; the master advertises its neighbor list to the server as shown in table 15:
table 15 neighbor list data for master advertisements
Belonging to area Neighbor identification Neighbor IP Time to live Whether master or not
area2 0000-0000-0000-0021 1.1.2.1 0 1
area2 0000-0000-0000-0022 1.1.2.2 0 0
area2 0000-0000-0000-0023 1.1.2.3 0 0
area2 0000-0000-0000-0024 1.1.2.4 0 0
Neighbor list on the server see table 16:
TABLE 16 neighbor List on Server
Figure GDA0002931706460000102
Figure GDA0002931706460000111
B: equipment detection: after the master and the backup are selected, the master periodically sends a neighbor detection message to the local area equipment by a polling mechanism, the neighbor enters into election inhibition after receiving the detection message and does not send a neighbor list of the local machine any more, the area master node 21 periodically sends the neighbor detection message to all the neighbors according to the neighbor list, if receiving a neighbor detection response message in 3 sending periods, the state information of the neighbor in the neighbor list is refreshed, and the master preferentially sends the neighbor detection message to the backup node 22 equipment when sending the neighbor detection message.
After receiving the detection message, the neighbor immediately sends a detection response message, and if the master receives the detection response message of the neighbor in 3 sending periods, the master indicates that the neighbor can reach, and the survival time is set to be 0; otherwise, the time-to-live is set to timeout.
Assuming that the node 23 is offline, the master sends 3 neighbor detection messages to the node 23, and if no response is found, the master immediately sends the neighbor unreachable message to the server, that is, the survival time of the neighbor is set to be overtime, and the server receives the information of the are2 node 23 overtime sent by the regional master node 21, and updates the survival time and online status of the neighbor, as shown in table 17:
TABLE 17 neighbor List on Server after node failure
Figure GDA0002931706460000112
Figure GDA0002931706460000121
C: adding new equipment: referring to fig. 4, after the new device node 25 joins the area2, the new device receives the master, that is, the probe message of the node 21, and sends its own neighbor list to the node 21, because all the neighbors of the new device are election-suppressed at this time, the neighbor list is only self, the node 21 receives the neighbor list, updates its own neighbor list and sends information of the newly joined network device to the server, and in order to maintain the stability of the network, even if the priority of the new device is higher than that of the original master, the new device will not become the master.
D: re-election: the backup means that the node 22 does not receive the detection messages of the master and the node 21 in 2 neighbor detection periods, the node 21 is considered to be invalid, the node 22 becomes the master to execute the role of the master for a period of time, the node 22 receives the neighbor detection messages of the node 21 again and then returns to the backup, finally, both the node 21 and the node 21 are invalid, the network equipment does not receive the detection messages in 5 detection periods, the competitive election inhibition is cancelled, and the election is entered again.
The above embodiments are only used to further illustrate a method for discovering and detecting network devices according to the present invention, but the present invention is not limited to the embodiments, and any simple modification, equivalent change and modification made to the above embodiments according to the technical spirit of the present invention fall within the protection scope of the technical solution of the present invention.

Claims (10)

1. A method for discovering and detecting network equipment comprises a server and a plurality of network equipment to be monitored in an area to be positioned, and further comprises the following steps:
a: and (3) master and backup election: dividing the area to be monitored into several sub-areas ensures that each network device belongs to only one sub-area, the server is connected with each network device through the network, each network device sends election messages to the working physical port and updates the neighbor list of each network device, the election message comprises a distance and a priority, the distance represents the number of network devices from the network device to other network devices, the priority is obtained by each network device through calculation according to the CPU core number, the CPU frequency, the memory number, the memory size and the back plate bandwidth parameter, the minimum distance is selected as a master, the next minimum distance is a backup, the maximum priority is selected as the master when the distances are the same, the next maximum distance is selected as a backup, the minimum mac address is selected as the master when the priorities are the same, the next minimum distance is a backup, race selection is finished when no new device is added after a period of time, and the master informs the server of the data of the own neighbor list;
b: equipment detection: the master sends detection messages to all neighbors periodically according to the neighbor list, the neighbors enter into election inhibition after receiving the detection messages, the neighbor list of the master is not sent any more, meanwhile, a detection response message is sent to the master, the master sends a neighbor message list whether the neighbors can reach or not to a server according to whether the detection response message is received or not within a period of time, the server updates the neighbor list in the server according to the neighbor message list sent by the master, the server can inquire whether specific network equipment can reach or not by controlling the master to send the detection messages to the specific network equipment, the server sends the detection messages to the inaccessible network equipment by the master or through the master and updates the neighbor list in the server according to the returning condition;
c: addition of new equipment: after a new device is added, the new device receives a neighbor detection message of a master, sends a neighbor list of the new device to the master, and after the master receives the neighbor list, updates the neighbor list of the new device and sends information of newly added network devices to a server;
d: re-election: when the backup does not receive the detection message of the master within a period of time, the master is considered to be invalid, the backup becomes the master, when the backup receives the detection message of the master again, the master is considered to be recovered to normal, the backup is recovered to backup, when the network equipment does not receive the detection message within a period of time, the master and the backup are considered to be invalid, the competition inhibition is cancelled, and the master and the backup are again entered into competition.
2. The method of claim 1, wherein the method comprises: in the step A, the election message further comprises a type field, an survival period and neighbor information, the type field indicates that the selectable types of the message comprise an election message and a maintenance message, the survival period indicates that the message stops transmitting after passing through a plurality of neighbors, the neighbor information comprises an affiliated area, a neighbor identifier, a neighbor IP and a neighbor priority, the affiliated area indicates a sub-area where the neighbor is located, the neighbor identifier indicates that the uniqueness of the neighbor is represented by adopting a mac address of the neighbor as the identifier, the neighbor IP indicates the IP address of the neighbor, and the neighbor priority indicates the priority of the neighbor.
3. The method of claim 1, wherein the method comprises: in step a, the neighbor list includes an affiliated area, a neighbor identifier, a neighbor priority, whether the affiliated area is a master, a neighbor IP, a survival time, and a distance to the neighbor, where the affiliated area represents a sub-area where the neighbor is located, the neighbor identifier represents that the mac address of the neighbor is used as an identifier to represent neighbor uniqueness, the neighbor priority represents the priority of the neighbor, whether the master represents whether the neighbor is a master, the neighbor IP represents an IP address of the neighbor, the survival time represents a time interval for the neighbor to send an adjacent message, and the distance to the neighbor represents the number of network devices that the network device passes through to the neighbor.
4. The method of claim 1, wherein the method comprises: in step A, the
Figure FDA0002931706450000031
Figure FDA0002931706450000032
Wherein α + β + γ ═ 1, α, β, γ ∈ (0, 1), a ≡ 255, and n is the core number of the network device CPU, and the CPU is a core number of the network device CPUiThe unit of the frequency of the ith CPU is MHz, m is the number of memory banks in the network equipment, memoryjThe size of the jth memory is represented by GByte, bandwidth is the bandwidth of the backplane of the network equipment, Gbps, alpha, beta and gamma are weight ratios of the CPU, the memory and the backplane bandwidth respectively, and i, j, m, N belongs to N.
5. The method of claim 1, wherein the method comprises: in step a, the priority may also be set manually.
6. The method of claim 3, wherein the method comprises: in step B, the master preferentially sends a detection message to the backup.
7. The method of claim 3, wherein the method comprises: in step B, if the master receives the neighbor detection response message in a plurality of sending periods, the neighbor is accessible, the survival time in the neighbor list is set to be 0, otherwise, the survival time in the neighbor list is set to be overtime.
8. The method of claim 3, wherein the method comprises: in step B, the neighbor message list includes the belonged region in the neighbor list, the neighbor identifier, the neighbor IP, the survival time, and the data of whether the master exists.
9. The method of claim 7, wherein the method comprises: in step B, the neighbor list in the server includes data in the neighbor list advertised by the master and an online status indicating whether the neighbor is online, the online status is updated according to the time-to-live, if the time-to-live is 0, the updated online status is online, and if the time-to-live is overtime, the updated online status is a failure.
10. The method of claim 1, wherein the method comprises: in step C, when the master and backup in the sub-area where the new device is located are working normally, the new device does not become the master.
CN201811196136.9A 2018-10-15 2018-10-15 Method for discovering and detecting network equipment Active CN109245940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811196136.9A CN109245940B (en) 2018-10-15 2018-10-15 Method for discovering and detecting network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811196136.9A CN109245940B (en) 2018-10-15 2018-10-15 Method for discovering and detecting network equipment

Publications (2)

Publication Number Publication Date
CN109245940A CN109245940A (en) 2019-01-18
CN109245940B true CN109245940B (en) 2021-04-27

Family

ID=65053557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811196136.9A Active CN109245940B (en) 2018-10-15 2018-10-15 Method for discovering and detecting network equipment

Country Status (1)

Country Link
CN (1) CN109245940B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365794B (en) * 2019-07-30 2021-09-14 四川虹魔方网络科技有限公司 Message pushing method and system based on Internet television
CN113055252B (en) * 2021-06-01 2021-09-07 深圳市科力锐科技有限公司 Method, device, equipment and storage medium for detecting newly added service host
CN117792915A (en) * 2022-09-22 2024-03-29 华为技术有限公司 System, network topology method and electronic equipment thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725733A (en) * 2005-06-10 2006-01-25 杭州华为三康技术有限公司 Method of route backup in combination equipment and combination equipment
CN101610182A (en) * 2009-06-26 2009-12-23 杭州华三通信技术有限公司 Multi-primary apparatus conflict detection method and stack member apparatus in piling up
CN102202425A (en) * 2011-06-24 2011-09-28 中国人民解放军国防科学技术大学 Satellite cluster self-organization networking method based on master-slave heterogeneous data transmission module
CN102624929A (en) * 2012-04-20 2012-08-01 武汉邮电科学研究院 Wireless sensor network gateway redundancy method based on virtual gateway
CN105915426A (en) * 2016-06-20 2016-08-31 普联技术有限公司 Failure recovery method and device of ring network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9526038B2 (en) * 2013-04-02 2016-12-20 Apple Inc. Circuit-switched fallback (CSFB) call setup utilizing multiple RF receive chains

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725733A (en) * 2005-06-10 2006-01-25 杭州华为三康技术有限公司 Method of route backup in combination equipment and combination equipment
CN101610182A (en) * 2009-06-26 2009-12-23 杭州华三通信技术有限公司 Multi-primary apparatus conflict detection method and stack member apparatus in piling up
CN102202425A (en) * 2011-06-24 2011-09-28 中国人民解放军国防科学技术大学 Satellite cluster self-organization networking method based on master-slave heterogeneous data transmission module
CN102624929A (en) * 2012-04-20 2012-08-01 武汉邮电科学研究院 Wireless sensor network gateway redundancy method based on virtual gateway
CN105915426A (en) * 2016-06-20 2016-08-31 普联技术有限公司 Failure recovery method and device of ring network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种改进的主从节点选举算法用于实现集群负载均衡;任乐乐 等;《中国计量学院学报》;20151023;全文 *

Also Published As

Publication number Publication date
CN109245940A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
US10257265B2 (en) Redundancy network protocol system
CN107438016B (en) Network management method, device, system and storage medium
US10136415B2 (en) System, security and network management using self-organizing communication orbits in distributed networks
CN109245940B (en) Method for discovering and detecting network equipment
US9742639B1 (en) Intelligent network resource discovery and monitoring
CN108259215B (en) Equipment management method and device
CN103888369A (en) Ethernet communication method and system and SDN exchanger
CN108449210B (en) Network routing fault monitoring system
JP2006229967A (en) High-speed multicast path switching
CN107579860A (en) Node electoral machinery and device
JP5764820B2 (en) Transmission system and transmission system control method
CN107317707B (en) SDN network topology management method based on point coverage set
CN102195857A (en) Network topology structure and node information gathering method
CN103595626A (en) Method for achieving dynamic path planning in ring network
CN101009628A (en) Update method and device for multicast list in the change of switching network topology
Mirkovic et al. A self-organizing approach to data forwarding in large-scale sensor networks
CN107612772B (en) Node state detection method and device of payment system
US8908682B2 (en) Switch discovery protocol for a distributed fabric system
CN101404594B (en) Hot backup performance test method and apparatus, communication equipment
US20210377125A1 (en) Network Topology Discovery Method, Device, and System
US11589246B2 (en) Method of managing distributed self-organizing network by surrounding base station information and base station using the same
CN116827801B (en) Network topology construction method, device, computer equipment and readable storage medium
US20050086368A1 (en) System and method for determining nearest neighbor information
CN101657994B (en) Discovery of disconnected components in a distributed communication network
CN113055197B (en) Network energy efficiency management method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant